Proceedings ArticleDOI
A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia
Ingemar J. Cox,J. Kilian,T. Leighton,Talal G. Shamoon +3 more
- pp 192-197
Reads0
Chats0
TLDR
A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.Abstract:
We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to a perceptual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel that is the data. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently water-marked copies of the data. It is also robust to common signal and geometric distortions such as digital-to-analog and analog-to-digital conversion, resampling, and requantization, including dithering and recompression and rotation, translation, cropping and scaling. The same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products. Retrieval of the watermark unambiguously identifies the owner, and the watermark can be constructed to make counterfeiting almost impossible. Experimental results are presented to support these claims.read more
Citations
More filters
Journal ArticleDOI
Collusion-secure fingerprinting for digital data
Dan Boneh,J M Shaw +1 more
TL;DR: This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video, and presents a general fingerprinting solution which is secure in the context of collusion.
Patent
Watermark embedder and reader
TL;DR: A watermark system includes an embedder, detector, and reader as mentioned in this paper, which can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.
Patent
Computer system linked by using information in data objects
TL;DR: In this paper, various improvements to steganographic systems, and applications, are disclosed, such as facilitating scale and rotation registration, improving robustness, and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration.
Patent
Methods for surveying dissemination of proprietary empirical data
TL;DR: In this article, an automated system checks networked computers such as computers on the internet, for watermarked audio, video, or image data, and provides a report listing the location of such audio or video data, provided to the proprietor(s) thereof identified by the watermark information.
Patent
Integrating digital watermarks in multimedia content
TL;DR: In this paper, a copy control method for decoding auxiliary data from media signals in multimedia content decodes watermarks from different media signals and uses the watermarks to control processing of the multimedia content.
References
More filters
Journal ArticleDOI
Theory of Spread-Spectrum Communications--A Tutorial
TL;DR: It is the intention of this paper to provide a tutorial treatment of the theory of spread-spectrum communications, including a discussion on the applications referred to, on the properties of common spreading sequences, and on techniques that can be used for acquisition and tracking.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.
Towards Robust and Hidden Image Copyright Labeling
Eckhard Koch,Jian Zhao +1 more
TL;DR: A method using a JPEG model based, frequency hopped, randomly sequenced pulse position modulated code (RSPPMC) is described, which supports robustness of embedded labels against several damaging possibilities such as lossy data compression, low pass filtering and/or color space conversion.
Proceedings ArticleDOI
Electronic marking and identification techniques to discourage document copying
TL;DR: Three coding methods are proposed that discourage illicit distribution by embedding each document with a unique codeword, yet enable one to identify the sanctioned recipient of a document by examination of a recovered document.